{"title":"利用混沌映射和奇异值分解的混合方法实现数字图像安全框架","authors":"Haidar Raad Shakir","doi":"10.1016/j.csfx.2022.100075","DOIUrl":null,"url":null,"abstract":"<div><p>Various encryption techniques, mostly based on mathematical and logical principles, are used for protecting sensitive data from attacks meant to modify or unauthorizedly distribute them. The importance of these techniques has grown significantly as various real-life applications in fields like medicine, banking, or transport are accompanied by increasing security concerns. Various effective cryptography schemes were proposed so far in the literature; however, each of them exhibits certain flaws and limitations with respect to different vital aspects. To overcome these issues, we propose a hybrid scheme for securing digital images by encrypting them using a dual security approach. More precisely, we use first a chaotic map for scrambling the image pixels, and then, we apply the singular-value decomposition method for decomposing the permuted image to provide very strong security. Individually each of these steps has already been considered in the cryptographic literature; however, their combination has not been proposed before this contribution. Experimental results on benchmark data validate our proposed scheme and various performance evaluation metrics indicate that it shows promising qualities in terms of security (against various attacks) and sensitivity in comparison with baseline methods.</p></div>","PeriodicalId":37147,"journal":{"name":"Chaos, Solitons and Fractals: X","volume":"8 ","pages":"Article 100075"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590054422000057/pdfft?md5=1d82cb6bd0dd3cfae41bfc59a3e558bd&pid=1-s2.0-S2590054422000057-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Implementing digital image security framework with hybrid approach of chaotic map and singular-value decomposition\",\"authors\":\"Haidar Raad Shakir\",\"doi\":\"10.1016/j.csfx.2022.100075\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Various encryption techniques, mostly based on mathematical and logical principles, are used for protecting sensitive data from attacks meant to modify or unauthorizedly distribute them. The importance of these techniques has grown significantly as various real-life applications in fields like medicine, banking, or transport are accompanied by increasing security concerns. Various effective cryptography schemes were proposed so far in the literature; however, each of them exhibits certain flaws and limitations with respect to different vital aspects. To overcome these issues, we propose a hybrid scheme for securing digital images by encrypting them using a dual security approach. More precisely, we use first a chaotic map for scrambling the image pixels, and then, we apply the singular-value decomposition method for decomposing the permuted image to provide very strong security. Individually each of these steps has already been considered in the cryptographic literature; however, their combination has not been proposed before this contribution. Experimental results on benchmark data validate our proposed scheme and various performance evaluation metrics indicate that it shows promising qualities in terms of security (against various attacks) and sensitivity in comparison with baseline methods.</p></div>\",\"PeriodicalId\":37147,\"journal\":{\"name\":\"Chaos, Solitons and Fractals: X\",\"volume\":\"8 \",\"pages\":\"Article 100075\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2590054422000057/pdfft?md5=1d82cb6bd0dd3cfae41bfc59a3e558bd&pid=1-s2.0-S2590054422000057-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chaos, Solitons and Fractals: X\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2590054422000057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chaos, Solitons and Fractals: X","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2590054422000057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
Implementing digital image security framework with hybrid approach of chaotic map and singular-value decomposition
Various encryption techniques, mostly based on mathematical and logical principles, are used for protecting sensitive data from attacks meant to modify or unauthorizedly distribute them. The importance of these techniques has grown significantly as various real-life applications in fields like medicine, banking, or transport are accompanied by increasing security concerns. Various effective cryptography schemes were proposed so far in the literature; however, each of them exhibits certain flaws and limitations with respect to different vital aspects. To overcome these issues, we propose a hybrid scheme for securing digital images by encrypting them using a dual security approach. More precisely, we use first a chaotic map for scrambling the image pixels, and then, we apply the singular-value decomposition method for decomposing the permuted image to provide very strong security. Individually each of these steps has already been considered in the cryptographic literature; however, their combination has not been proposed before this contribution. Experimental results on benchmark data validate our proposed scheme and various performance evaluation metrics indicate that it shows promising qualities in terms of security (against various attacks) and sensitivity in comparison with baseline methods.